1PROBE::NETFILTER.A(3stap) Networking Tapset PROBE::NETFILTER.A(3stap)
2
3
4
6 probe::netfilter.arp.in - - Called for each incoming ARP packet
7
9 netfilter.arp.in
10
12 ar_data
13 Address of ARP packet data region (after the header)
14
15 ar_sip
16 Ethernet+IP only (ar_pro==0x800): source IP address
17
18 ar_hrd
19 Format of hardware address
20
21 outdev
22 Address of net_device representing output device, 0 if unknown
23
24 data_hex
25 A hexadecimal string representing the packet buffer contents
26
27 indev
28 Address of net_device representing input device, 0 if unknown
29
30 ar_pro
31 Format of protocol address
32
33 ar_tip
34 Ethernet+IP only (ar_pro==0x800): target IP address
35
36 nf_accept
37 Constant used to signify an 'accept' verdict
38
39 nf_repeat
40 Constant used to signify a 'repeat' verdict
41
42 ar_op
43 ARP opcode (command)
44
45 ar_pln
46 Length of protocol address
47
48 nf_stolen
49 Constant used to signify a 'stolen' verdict
50
51 arphdr
52 Address of ARP header
53
54 indev_name
55 Name of network device packet was received on (if known)
56
57 ar_sha
58 Ethernet+IP only (ar_pro==0x800): source hardware (MAC) address
59
60 ar_hln
61 Length of hardware address
62
63 nf_drop
64 Constant used to signify a 'drop' verdict
65
66 data_str
67 A string representing the packet buffer contents
68
69 length
70 The length of the packet buffer contents, in bytes
71
72 nf_queue
73 Constant used to signify a 'queue' verdict
74
75 nf_stop
76 Constant used to signify a 'stop' verdict
77
78 outdev_name
79 Name of network device packet will be routed to (if known)
80
81 pf
82 Protocol family -- always “arp”
83
84 ar_tha
85 Ethernet+IP only (ar_pro==0x800): target hardware (MAC) address
86
88 tapset::netfilter(3stap)
89
90
91
92SystemTap Tapset Reference November 2022 PROBE::NETFILTER.A(3stap)